Ecosystem modules (npm) and supply chainAn introduction to the challenges of NPM modules.
Course descriptionMost Node.js applications rely heavily on NPM modules. This course will focus on the risks introduced by using third-party modules and how to mitigate them.
Supply chain attacks
Video - 00:14:00
Most Node.js applications rely heavily on NPM modules. This video will focus on the risks introduced by using third-party modules and how to mitigate them.
What to do if a module I use is flagged as vulnerable?
Video - 00:12:00
Sometimes, a module is flagged as vulnerable. Don’t panic! This video will show you how to evaluate how bad the situation is.
The art of choosing the right npm module
Video - 00:14:00
Choosing a NPM module is often not an easy task. In this video, we will go through the process of selecting the right module and introduce tools to help make that choice.
Anatomy of package.json
Video - 00:15:00
This video is a refresher about package.json files. There might be some features here that are less known and deserved to be exposed.
Associated NICE Work Roles
All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.
- Cyber Operator
- Data Analyst
- Program Manager
Plans & pricing
- Team administration and reporting
- Dedicated client success manager
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps